A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 385 - 396 of 789 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Your 2021 Security Strategy: NDR or XDR? December 09, 2020 By working with cloud providers to open up packets to security vendors, network detection/response enables comprehensive visibility in the cloud. Read the Blog Image Blog Key Principles in Building Operational Resilience December 02, 2020 This post articulates the five key principles for building operational resilience across the organization. Read the Blog Image Blog Thought Leadership and Science Fiction November 19, 2020 When your world is so technically advanced it might as well be science fiction, thought leadership always has to be looking around the next corner. Read the Blog Image Blog NIST SP 800-53 Rev 5: Understanding, Preparing for Change November 18, 2020 NIST’s Special Publication 800-53 Revision 5 provides guidance on the next generation of the security and privacy controls framework. Read the Blog Image Blog Insecure API Cloud Computing: The Causes and Solutions November 16, 2020 While cloud APIs can streamline processes, they can also invite in new security risks. ExtraHop’s Matt Cauthorn offers best practices to stay secure. Read the Blog Image Blog Certificate Validation Disabled in Black Duck API Wrapper November 05, 2020 A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more. Read the Blog Image Blog Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions November 04, 2020 How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series. Read the Blog Image Blog Robotic Process Automation with WinAutomation November 04, 2020 Part four in the series: setting up RPA with WinAutomation. Read the Blog Image Blog Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks November 04, 2020 How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series. Read the Blog Image Blog Assigning Specific Public IP Addresses With Azure Automation Runbook November 04, 2020 How to assign a specific public IP address using Azure Automation runbook. Part three in a series. Read the Blog Image Blog Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand November 04, 2020 How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series. Read the Blog Image Blog Provisioning RPA Test Environments With Azure Automation Runbooks November 04, 2020 How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 29 Page 30 Page 31 Page 32 Current page 33 Page 34 Page 35 Page 36 Page 37 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Your 2021 Security Strategy: NDR or XDR? December 09, 2020 By working with cloud providers to open up packets to security vendors, network detection/response enables comprehensive visibility in the cloud.
Image Blog Key Principles in Building Operational Resilience December 02, 2020 This post articulates the five key principles for building operational resilience across the organization.
Image Blog Thought Leadership and Science Fiction November 19, 2020 When your world is so technically advanced it might as well be science fiction, thought leadership always has to be looking around the next corner.
Image Blog NIST SP 800-53 Rev 5: Understanding, Preparing for Change November 18, 2020 NIST’s Special Publication 800-53 Revision 5 provides guidance on the next generation of the security and privacy controls framework.
Image Blog Insecure API Cloud Computing: The Causes and Solutions November 16, 2020 While cloud APIs can streamline processes, they can also invite in new security risks. ExtraHop’s Matt Cauthorn offers best practices to stay secure.
Image Blog Certificate Validation Disabled in Black Duck API Wrapper November 05, 2020 A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more.
Image Blog Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions November 04, 2020 How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series.
Image Blog Robotic Process Automation with WinAutomation November 04, 2020 Part four in the series: setting up RPA with WinAutomation.
Image Blog Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks November 04, 2020 How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series.
Image Blog Assigning Specific Public IP Addresses With Azure Automation Runbook November 04, 2020 How to assign a specific public IP address using Azure Automation runbook. Part three in a series.
Image Blog Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand November 04, 2020 How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series.
Image Blog Provisioning RPA Test Environments With Azure Automation Runbooks November 04, 2020 How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series.